Tag Archives: LOG SECURITY

Video Management Systems play an integral role in tracking down perpetrators of all types as well as preventing criminal incidents in general. You need to protect the integrity of your camera’s and the information it collects by making sure your security practices minimize unauthorized access . Here are some practices that you can follow to help manage the overall security of your cameras:

Create an inventory of all the cameras on your network, including the information for the primary and secondary contact person who manages the cameras, the camera manufacturer, model, location, IP address, current firmware version.

Ensure that there is no physical access to the cameras, the supporting network equipment, the server and video storage for your system (i.e. cables, switches, etc.). These should all be in located in access-controlled areas.

Ensure that there are no default passwords used by any of the cameras and operating system if they are accessible to the administrator or user accounts. If there is a need to update a password, use a complex and lengthy password for each individual camera.

Set the idle session timeout for your camera’s interface to ensure that the web session is terminated even for those users who don’t log off of the camera.

Place your camera system on a separate network from your operational network. This helps to reduce the impact of camera traffic on your operational network, and makes it harder for an attacker on one network to gain access to the other.

Periodically reviewing and updating your practices and settings will provide you an opportunity to make you camera still meets your security needs. To learn more about the Cyber Protection Program visit our website at tycosecurityproducts.com/CyberProtection.aspx. For any questions you may have on the Cyber Protection Program, email jeffbarkley@tycoint.com